Chinese Hackers Indicted

US prosecutors have charged 12 Chinese nationals for being part of an alleged hacking scheme, which sold data of US-based dissidents to the Chinese government. However, none of the 12 defendants are in US custody.

These alleged criminals include two officers of the People's Republic of China's (PRC) Ministry of Public Security (MPS), eight employees of an apparently private company, Anxun Information Technology.

The charges are the first major hacking-related national security case brought under President Donald Trump’s Justice Department, though the investigation began long before Trump took office. Federal officials accused 10 of collaborating to steal data from their targets. Eight of the suspects worked for the company known as Anxun Information Technology, better known as i-Soon, and two worked for the Chinese Ministry of Public Security.

The "state-sponsored" operation also targeted government agencies including the Treasury, according to the Justice Department (DOJ).

Hackers also allegedly targeted an American religious organisation, and a newspaper in Hong Kong, the statement added. China has not responded to these specific allegations, but have strongly denied other accusations in the past.

In December 2024, the Treasury Department reported a breach by Chinese sponsored hackers, saying they were able to access employee workstations and some unclassified documents. At that time, China denied any involvement, calling the accusation "baseless" and saying it "consistently opposes all forms of hacking". It is unclear when the latest DOJ charges were issued, but they were unsealed in a federal court in Manhattan recently.

Amongst the individuals charged were two officers of China's Ministry of Public Security. The DOJ said that hackers, which appeared to represent a private company, i-Soon, charged Chinese agencies between $10,000 and $75,000 for each "exploited" email inbox. They allegedly "conducted computer intrusions" under the direction of Chinese ministries and on their own initiative, and were "paid handsomely for stolen data".

"Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide," said Sue J Bai, who heads the DOJ's National Security Division.

"We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security," she added. No further details on the targeted US-based dissidents were provided.

U.S. DoJ     |     BBC     |     CNN     |     NBC News   |   Reuters     |    The Hacker News

You Might Also Read:

Cyber Threat Forecast 2025 Part One - North America:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Apple Takes Legal Action Over Data Privacy
Data Breaches Cause A Financial Burden »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.